- From: Mark S. Miller <erights@google.com>
- Date: Fri, 12 Feb 2010 19:19:22 -0800
- To: Jonathan Rees <jar@creativecommons.org>
- Cc: noah_mendelsohn@us.ibm.com, www-tag@w3.org
Received on Saturday, 13 February 2010 03:19:51 UTC
I wrote: > Amoeba had the same weakness as Jed's systems -- only on the authentication side, not on the authorization side. This was terribly unclear. What I mean is that Amoeba and Jed's systems were both weak on the authentication side. Assuming proper authentication, neither was weak on the authorization side. Likewise with web-keys. Assuming that all root CAs do their duties, web-keys provide capability-like authorization.
Received on Saturday, 13 February 2010 03:19:51 UTC